hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Comptia exam 106-213
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (108)
Which of the following would most likely use an ARM processor?
A. Laptop
B. Tablet
C. Workstation
D. Sever
B. Tablet
A systems administrator wants to run a script at a certain time every day. Which of the following is the best way to achieve this?
A. Perform process management.
B. Perform task scheduling.
C. Set the system date and time.
D. Set a reminder to run the script
B. Perform task scheduling.
Which of the following would indicate the fastest processor speed?
A. 3.6Ghz
B. 3.6Mhz
C. 3.6Mbs
D. 3.6Gbs
A. 3.6Ghz
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user most likely to configure to allow this?
A. Cable modem
B. Wireless router
C. Access point
D. Network switch
A. Cable modem
The computer language that is closest to machine code is:
A. Query language
B. Scripted language
C. Markup language
D. Assembly language
D. Assembly language
Employee information is stored in a database. Which of the following best describes where all of an employee's information is stored?
A. Record
B. Report
C. Column
D. Procedure
A. Record
Which of the following is an example of an interpreted language?
A. C++
B. Java
C. Python
D. Go
C. Python
An employee's laptop does not connect to the internet when it is used in a coffee shop. Which of the following is the most likely cause?
A. Script blocker
B. Proxy settings
C. Private Browsing
D. Full browser cache
B. Proxy settings
Which of the following filesystems would a Linux computer most likely have?
A. HFS
B. NTFS
C. FAT32
D. ext4
D. ext4
Which of the following concerns does installing cross-platform software address?
A. Subscription
B. Licensing
C. Product key
D. Compatibility
D. Compatibility
Which of the following requires the most frequent updating to remain effective?
A. Antivirus
B. Host firewall
C. Web browser
D. Device drivers
A. Antivirus
Which of the following best explains the use of float over integer to store monetary values?
A. It accepts negative values.
B. It stores symbols.
C. It accommodates larger values.
D. It supports decimals.
D. It supports decimals.
An IP address is 32 bits long. If converted to bytes, it would be:
A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 64 bytes
A. 4 bytes
Which of the following best describes the purpose of a vector in programming?
A. Storing a collection of data
B. Repeating a similar operation
C. Capturing user input
D. Performing mathematical calculations
A. Storing a collection of data
Which of the following WiFi security options would create the most need for a VPN connection on the client device?
A. Open
B. WEP
C. WPA
D. WPA2
A. Open
Which of the following best describes a technology that allows multiple users to create and edit reports at the same time?
A. Text file on a shared drive
B. Managed relational database
C. Informational intranet page
D. Locally installed productivity software
B. Managed relational database
company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
A. One-tier
B. Two-tier
C. Three-tier
D. n-tier
A. One-tier
A global variable called "age" will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
A. Integer
B. Float
C. Double
D. String
A. Integer
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the best assistance in generating reports?
A. Data capture and collections
B. Asset inventory inputs
C. Sales statistics
D. Average loss output
A. Data capture and collections
A business would like to create an employees portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
A. Local application
B. Intranet application
C. Extranet application
D. Internet application
B. Intranet application
A company technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
A. Printer
B. Mouse
C. Webcam
D. External hard drive
E. Speakers
F. Display
B. Mouse
F. Display
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
A. POP3
B. IMAP
C. ICMP
D. SMTP
A. POP3
Consider the following statements:
if userin = "commander"
the clearance = "topsecret"
else if userin = "analyst"
then clearance = "restricted"
else
clearance = "normal"
Given the input (userin) of "analyst" , to which of the following would the clearance variable be set?
A. topsecret
B. normal
C. analyst
D. restricted
D. restricted
Which of the following is a reason why complex passwords are required?
A. To encourage password variety
B. To prevent someone from guessing them
C. To make them harder to remember
D. To reduce social engineering attacks
B. To prevent someone from guessing them
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this example of?
A. Duplicate the problem
B. Gather information
C. Question users
D. Divide and conquer
A. Duplicate the problem
Which of the following storage types is most vulnerable to magnetic damage?
A. Flash
B. SSD
C. Optical
D. HDD
D. HDD
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
A. Method
B. Object
C. Property
D. Attribute
D. Attribute
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is most likely cause?
A. The light switches do not support WPA2
B. The router is operating on a different channel
C. The key does not meet password complexity
D. The SSID is not being broadcast
B. The router is operating on a different channel
Given the following pseudocode:
For each apple in the basket, eat two oranges unless it is the last apple, then eat three oranges.
If there are even apples in the basket, which of the following would be the number of oranges a person eats?
A. 10
B. 14
C. 15
D. 17
C. 15
Which of the following are the primary functions of an operating system? (Choose two)
A. Provide structure for file and data management.
B. Provide protection against malware and viruses.
C. Provide peer-to-peer networking capability.
D. Provide user data encryption.
E. Provide virtual desktop capability
F. Provide system resources.
A. Provide structure for file and data management.
F. Provide system resources.
SQL databases use primary and foreign keys to enable which of the following?
A. Rows
B. Fields
C. Schemas
D. Relationships
D. Relationships
Which of the following is a logical structure for storing files?
A. Folder
B. Extensions
C. Permissions
D. Shortcut
A. Folder
Which of the following is both an input and output device?
A. Microphone
B. Speaker
C. Touch-screen monitor
D. Keyboard
A. Microphone
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the next troubleshooting step the technician should do?
A. Determine if anything has changed.
B. Document lessons learned.
C. Establish a theory of probable cause.
D. Duplicate the problem, if possible.
B. Document lessons learned.
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
A. Password history
B. Password reuse
C. Password expiration
D. Password age
C. Password expiration
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
A. Backups
B. Prioritization
C. Indexes
D. Failover
D. Failover
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would most likely identify the issue?
A. Checking the proxy settings
B. Checking that caching is enabled
C. Checking browser add-ons
D. Checking certificate validity
D. Checking certificate validity
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A. Antivirus
B. Anti-malware
C. Device Manager
D. Host firewall
D. Host firewall
Which of the following contains exactly four copper wires?
A. RJ45
B. VGA
C. RJ11
D. USB
C. RJ11
A technician replaces the video card is a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would most likely fix this problem/
A. Replace the user's display.
B. Update the PC's operating system.
C. Replace the video cable.
D. Install new video drivers.
D. Install new video drivers.
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would most likely be used to store the data?
A. Server
B. Tape library
C. External HDD
D. Workstation
A. Server
Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?
A. Behavior security
B. Information Identity Management
C. Unauthorized hacking
D. Authorized hacking
A. Behavior security
A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is most useful to meet this goal?
A. Input validation
B. System updates
C. Password lockout
D. Login auditing
C. Password lockout
Which of the following is the number of bytes that is in 2KB?
A. 1024
B. 2048
C. 20000
D. 1048576
B. 2048
A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the best option to improve the security of the network?
A. Change the SSID.
B. Change the default password.
C. Change to WEP security.
D. Create a guest network.
D. Create a guest network.
Which of the following is the best overall storage option for a laptop?
A. Flash drive
B. Hard drive
C. SD card
D. Solid-state drive
D. Solid-state drive
A technician has worked through all the steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do next?
A. Escalate as necessary.
B. Confirm the root cause.
C. Establish a new theory.
D. Gather information.
A. Escalate as necessary.
A network has been infected with a worm. Which of the following would be the best security measures to take? (Choose two.)
A. Update the IPS signatures.
B. Update the network firewall.
C. Update the malware definitions.
D. Quarantine the network.
E. Reset the network router.
F. Contact the ISP.
C. Update the malware definitions.
D. Quarantine the network.
The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is most likely the problem?
A. Private browsing is being used by some clients visiting the site.
B. Client-side scripting has been deactivated on some clients visiting the site.
C. Legacy browsers that do not support scripting are being used by some clients.
D. Server-side scripting has been deactivated by the server administrator.
B. Client-side scripting has been deactivated on some clients visiting the site.
Which of the following is most likely to be considered protected personal information?
A. Property tax records
B. Court records
C. Medical records
D. Genealogy records
C. Medical records
A system administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the downloads and ensures the results match the published hash for the file. This is an example of:
A. Confidentiality concerns
B. Accounting concerns
C. Integrity concerns
D. Availability concerns
C. Integrity concerns
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
A. Record
B. Constraint
C. Field
D. Schema
D. Schema
The CEO has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
A. Eavesdropping
B. Email service outage
C. Man-in-the-middle
D. Denial-of-service
C. Man-in-the-middle
Which of the following is an IP address?
A. 0x64F32
B. 00:0F:AC:17:2F:32
C. 10010110
D. 172.0.0.1
D. 172.0.0.1
A developer is troubleshooting code in a application. The code is supposed to return the word "vegetables" if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would best correct the issues?
A. If category id = 1 then "Fruit"
Else "Vegetables"
B. If category id = 1 then "Fruit"
Else if category id = 2 then "Vegetables"
Else "Candy"
C. If category id <> 1 then "Vegetable"
Else "Fruit"
D. If category id = 1 then "Fruit"
Else if category id >= 2 then "Vegetables"
Else "Candy"
B. If category id = 1 then "Fruit"
Else if category id = 2 then "Vegetables"
Else "Candy"
Which of the following would allow an application to run automatically when a computer is started?
A. Processes
B. Journaling
C. Services
D. Drivers
A. Processes
An organization exports an inventory database nightly. This is an example of:
A. Database query.
B. Database report.
C. Database backup.
D. Database import.
C. Database backup.
A user is having issues connecting to the Internet through a web browser: however, the user is receiving email and instant messages. Which of the following should the user do to best resolve the issue?
A. Validate the certificate.
B. Verify the proxy settings.
C. Disable the pop-up blocker.
D. Clear the browser cache.
B. Verify the proxy settings.
Which of the following data types best performs calculations?
A. Integer
B. Char
C. String
D. Vector
A. Integer
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to best protect online banking information?
A. Install and configure a firewall.
B. Install and run an antivirus program.
C. Install and use another browser.
D. Install and configure an IDS.
B. Install and run an antivirus program
Which of the following internal computing components has the primary function of producing visual output to a monitor or other display device?
A. CPU
B. VGA
C. GPU
D. GUI
B. VGA
A schema is a critical part of which of the following?
A. Relational database
B. Key/value database
C. Document database
D. NoSQL database
A. Relational database
In a mobile phone, which of the following wireless technologies is most likely to provide internet connectivity?
A. RF
B. IR
C. VPN
D. NFC
C. VPN
Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement?
A. Password history
B. Password length
C. Password reuse
D. Password complexity
C. Password reuse
Which of the following encryption types would best be used to protect data on a shared computer?
A. File
B. VPN
C. Email
D. Mobile
A. File
A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager most likely to use?
A. Spreadsheet software
B. Word processing software
C. Presentation software
D. Visual diagramming software
D. Visual diagramming software
Which f the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter?
A. Web applications
B. Hypervisor
C. Load balancer
D. Dynamic routing
B. Hypervisor
Which of the following is the best example of structured data?
A. Employee beverage preferences organized in a single text field
B. Manager home addresses stored in a flat file without fields
C. Vendor order information stored in unnamed files
D. Customer information that can be sorted or grouped by any field
D. Customer information that can be sorted or grouped by any field
Which of the following numbering systems is used to represent MAC addresses?
A. Binary
B. Decimal
C. Octal
D. Hexadecimal
D. Hexadecimal
A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?
A. Import
B. Export
C. Create
D. Query
A. Import
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
A. Enabling encryption
B. Setting a new SSID
C. Changing the default password
D. Using 802.11ac
A. Enabling encryption
Which of the following programming language types is generally the fastest way to write a program ad hoc tasks quickly?
A. Compiled programming language
B. Assembly language
C. Scripted language
D. Pseudocode
C. Scripted language
A user has been instructed to use unique passwords for accessing each system. Which of the following best describes the potential risk of using the same password?
A. The password might be easier for an attacker to guess.
B. password compromise would allow access to all of the systems.
C. Single sign-on would be unable to function correctly.
D. Systems might reject the password based on different requirements
B. Password compromise would allow access to all of the systems.
Which of the following should be used to store a list of strings?
A. Array
B. Constant
C. Variable
D. Branch
A. Array
Which of the following services is used to translate URL to an IP address?
A. ARP
B. IMAP
C. DNS
D. MAC
C. DNS
Which of the following is the best method for ensuring there is no Telnet access?
A. Network sniffer
B. Intrusion detection system
C. Antivirus software
D. Host-based firewall
D. Host-based firewall
Which of the following types of software is most effective for tracking and communicating time spent on tasks for each team member?
A. Spreadsheet
B. Collaborative workspace
C. Project management
D. Personal information management
C. Project management
A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?
A. RG6
B. DB9
C. RJ11
D. RJ45
D. RJ45
Which of the following computing devices is most likely to have an internal wireless antenna?
A. Mobile phone
B. Workstation
C. Server
D. NAS
A. Mobile phone
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
A. Implement the solution.
B. Identify the problem.
C. Verify system functionality.
D. Establish a theory of the cause.
B. Identify the problem.
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
A. Loss of revenue in case of a breach
B. Difficulty of integration
C. Training involved for IT staff and users
D. Amount of equipment the will be replaced
A. Loss of revenue in case of breach
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
A. Logs
B. Password
C. Receipt
D. Encryption
E. Database
F. Software token
B. Passwords
F. Software token
A program will request user input and perform an operation several times if the input is correct. Which of the following techniques best describes the fact that the operation is only performed if the input is correct?
A. Looping
B. Branching
C. Reuse
D. Modeling
A. Looping
A company is devolving an application that will be used to simplify typing on a virtual keyboard. This will most likely be installed on:
A. a mobile OS.
B. a workstation OS.
C. a server OS.
D. an embedded OS.
A. a mobile OS.
Which of the following examples are most typical of fault tolerance practices used in business continuity planning? (Choose two).
A. RAID storage
B. Uninterruptible power supplies
C. Off-site backups
D. Private cloud servers
E. Virtual-hosted desktops
F. Warm sites
B. Uninterruptible power supplies
C. Off-site backups
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be best for the programmer to use?
A. IF THEN
B. WHILE
C. FOR
D. BEGIN
A. IF THEN
Which of the following has the longest range?
A. NFC
B. Bluetooth
C. WiFi
D. Infrared
C. WiFi
Which of the following programming constructs would be used to repeat a statement 100 times in a loop?
A. IF
B. ELSE
C. RETURN
D. WHILE
D. WHILE
A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?
A. Manually install the driver software.
B. Connect the mouse.
C. Configure the USB port.
D. Download the driver software.
B. Connect the mouse.
Which of the following is the weakest link in the security posture of an organization?
A. Technology
B. Infrastructure
C. People
D. Regulations
C. People
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
A. Drawing a value stream map.
B. Developing pseudocode
C. Identify functions
D. Compiling the language
B. Developing pseudocode
A security administrator is adding accounting features to a web application. Which of the following would be the best action?
A. Enhance the granularity of user permissions.
B. Enable an audit log.
C. Implement smart card login.
D. Adopt a procedure for adding accounts.
B. Enable an audit log.
A system administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
A. Text editor
B. Word processor
C. Command line
D. Spreadsheet
C. Command line
Which of the following will a company do to update a customer's address while using a flat file database?
A. Update the address for each order the customer placed.
B. Update the address in the customers address table.
C. Update the address field in the customers order table.
D. Update the primary key to reflect the customer's address.
C. Update the address field in the customer's order table.
A developer embeds a query in a high-level program to extract information from a database. This is an example of:
A. Database direct access.
B. Database utility access.
C. Database programmatic access.
D. Database manual access.
A. Database direct access.
Which of the following is the lowest unit for measuring bandwidth?
A. Mbps
B. Kbps
C. MBps
D. KBps
B. Kbps
A user connects a company computer to free WiFi at a local coffee shop. Which of the following best describes this situation?
A. Information on this network is encrypted.
B. The information on the network can be seen by others.
C. It is safe to access company information using the network.
D. Private browsing mode protects the information on the network.
B. The information on the network can be seen by
others.
A user wands to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
A. Driver
B. USB cable
C. IP address
D. Workstation
C. IP address
Which of the following is used for assigning IP addresses to networking devices?
A. SMTP
B. DHCP
C. DNS
D. ARP
B. DHCP
A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis of the information. Which of the following concepts is most closely tied to the root cause of this issue?
A. Data correlation
B. Data security
C. Data capture
D. Data as an asset
A. Data correlation
During a power outage, a sever with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician than separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
A. Implement preventative measures.
B. Establish a plan of action.
C. Document findings/lessons learned.
D. Test the theory to determine the cause.
B. Establish a plan of action.
An end user reports seeing the old company intranet site and not the recently updated version. Which of the following would most likely solve the problem?
A. Clear browser cache.
B. Change "http" to "https" in the URL.
C. Disable all add-ons.
D. Enable pop-up blockers.
A. Clear browser cache.
Which of the following best describes a LAN-hosted application? (Choose two.)
A. Internet access required
B. Services required
C. Network required
D. Files saved to cloud
E. Internet access not required
F. Cloud availability
C. Network required
E. Internet access not required
A technician is given a document with step-by-step instructions to perform a task. Which of the following best describes that document?
A. Policies
B. Standards
C. Procedures
D. Guidelines
C. Procedures
A technician installs a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the most current driver?
A. Installation disc that came with the device
B. OEM website for the camera
C. Internet help-desk forums
D. Computer manufacturer's website
B. OEM website for the camera
Which of the following is a benefit of a locally hosted network solution?
A. No internet access is required.
B. There are fewer IT support requirements.
C. System backups are not required.
D. System fault tolerance is increased.
A. No internet access is required.
Which of the following is an example of a compiled language?
A. Perl
B. HTML
C. Java
D. Python
C. Java
When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause?
A. Question the obvious.
B. Identify the symptoms.
C. Duplicate the problem.
D. Determine if anything has changed.
D. Determine if anything has changed.
Verified questions
other
Which operation on a pwc requires more than idle speed?
other
Alcohol is: A. A drug B. An anti-depressant C. A hallucinogen D. All of the above
other
It’s possible to drink too much and: A. Slow heart rate and breathing B. Risk coma or death C. Choke or suffocate on vomit D. All of the above
other
Which of the following is true about drinking and driving: A. As long as someone is under the legal alcohol limit, it is safe to drive B. If under 21, it is illegal to drive with any measurable amount of alcohol in one’s blood system C. It takes at least 2 drinks before driving is impaired D. Both B and C
Other Quizlet sets
Standard 2 MLE
20 terms
PED questions that are hard to remember
81 terms
Psychology 2301 Chapter 11
25 terms
PHIL-1010 Exam 1
10 terms